Security Advice For Using Video Conference Tools

Cyber security experts are warning people that the video meeting programs we now rely on might not be as secure as some might think. “Zoom bombing” is becoming a trend where people who are not supposed to be able to access Zoom meetings are getting in anyway.  The experts say that people using the program should double check their privacy settings, and shouldn’t post the link to zoom meetings on public forums unless necessary. 

Telecommuting and home-based learning is the new normal and people around the world are using video meetings and its essential that you know how to use video conferencing tools safely. 

In Singapore more than half a million students will be on home-based learning and even more adults will use video meeting working from home.One day after the start of the home-based learning period on April 8 the Singapore Ministry of Education announced that it was suspending Zoom following one incident in which hackers hijacked some students’ Zoom stream and showed pornographic content.

Similar “Zoom bombing” incidents have been reported around the world. In the wake of this and other privacy and cyber security concerns. Zoom has improved some of its security features and meeting controls. So what should users take note of to prevent themselves from becoming victims of harassment, privacy loss and eavesdropping when using video conferencing tools ?

Five Top Tips

  • It is vital to use the latest version of the software so that the bugs of the past would have been removed or fixed.
  • Remember that companies such as Zoom collect personal data such as name, email address, phone number, job title and even employer, as well as the IP address and device being used. Furthermore, if users sign in using Facebook, information will be collected from the Facebook profile. To retain some privacy, avoid using Facebook to sign in. 
  • Do not share your meeting link on public forums or on social media as this makes it easier for unauthorised persons to gain access to your meeting.
  • Familiarise yourself with your platform’s features and settings so as to be secure and protect your virtual space. For instance, Zoom has a “Waiting Room” feature that enables the host to manage the people who join and leave the meeting. Using this feature will enhance your security when hosting a meeting.
  • Users should refrain from using one’s Personal Meeting ID (PMI) to host events for the public. One’s PMI is a personal virtual meeting space that should not be open to others, except for close and trusted colleagues or users.

While using their video cameras during a Zoom session, users who want to increase the privacy level and prevent others from seeing the details of their physical background or surroundings can activate the virtual background feature such as a scene from the beach. You can choose to switch off your camera, if the video feature is not required.  

As a host of meetings or conferences, you can take extra precautions. For example, you should retain control of the screen.
Before and during a meeting, you can restrict the ability to screen share, so as to prevent others from sharing undesirable content or snatching control of your screen.

  • Additional security measures include setting up a two-factor authentication. Users can then only get access if they have the randomly generated meeting ID and a password. This enhances the level of security and limited access.
  • Another approach is to only enable signed-in or pre-invited users to join in the meeting.
  • You can “lock the meeting”. This Zoom feature allows the host to prevent others from joining the meeting. In this way, those with the meeting ID and password also cannot enter this virtual meeting room, once it is “locked”.     
  • To increase security and control as a host, you can exercise the option to remove disruptive and undesirable participants from the meeting.
  • You can  put the participants on hold and temporarily disable their video and audio connections to reduce noise and prevent interference.  

Such features will be useful for educators when they are using video-conferencing tools with an excited or vocal group of students.

Besides Zoom, there are other video-conferencing options such as Skype, though it has a limit of a maximum of 50 users per session. Users might also consider using  more secure platforms for business, like Google Meet and Facetime. Microsoft Teams is another free and popular video-conferencing platform with file and screen sharing features, capable of hosting up to 250 participants in a meeting.

Microsoft Teams and Google Meet require users to have accounts with them, whereas Zoom allows users to participate using their web browsers.  

Another leading provider is Cisco Webex, which offers a secure video-conferencing platform that does not require participants to have a Webex account to join the online meetings. Its free version can host up to 100 participants, with a range of features including a white board function and no time limit for meetings.  

Ultimately, each video-conferencing option has its strengths and limitations and the onus is on users to examine the security features carefully and use them effectively. Companies offering video-conferencing tools should highlight to users their security features and make a number of these features the default standard mode of use.

Parents and teachers could also educate their young to be aware of the importance of cyber security and to apply security measures when they are online. Cyber security is an essential life skill to protect us from online dangers and viruses, as we work and learn at home, while we fight the Covid-19 pandemic.

Today Online:     Today Online:       ABC News:      Technical.ly Baltimore:

You Might Also Read:

Hackers Are Exploiting Remote Workers:

 

« Quantum Computing, Hackers & The Internet of Things
Addressing Cyber Threats With Positive Action »

CyberSecurity Jobsite
Perimeter 81

Directory of Suppliers

Jooble

Jooble

Jooble is a job search aggregator operating in 71 countries worldwide. We simplify the job search process by displaying active job ads from major job boards and career sites across the internet.

ZenGRC

ZenGRC

ZenGRC (formerly Reciprocity) is a leader in the GRC SaaS landscape, offering robust and intuitive products designed to make compliance straightforward and efficient.

Directory of Cyber Security Suppliers

Directory of Cyber Security Suppliers

Our Supplier Directory lists 7,000+ specialist cyber security service providers in 128 countries worldwide. IS YOUR ORGANISATION LISTED?

Practice Labs

Practice Labs

Practice Labs is an IT competency hub, where live-lab environments give access to real equipment for hands-on practice of essential cybersecurity skills.

Authentic8

Authentic8

Authentic8 transforms how organizations secure and control the use of the web with Silo, its patented cloud browser.

High-Tech Bridge

High-Tech Bridge

High-Tech Bridge SA is a Swiss MSSP provider offering security auditing, source code review and computer forensics.

QASymphony

QASymphony

QASymphony software testing and QA tools help companies create better software by improving speed, efficiency and collaboration during the testing lifecycle.

Cato Networks

Cato Networks

Cato connects your branch locations, physical and cloud datacenters, and mobile users into a secure and optimized global network in the cloud.

Packet Ninjas

Packet Ninjas

Packet Ninjas is a niche cyber security agency with specialized expertise in the use of digital intelligence to strengthen cyber security.

National Information Technology Development Agency (NITDA) - Nigeria

National Information Technology Development Agency (NITDA) - Nigeria

The National Information Technology Development Agency (NITDA) is committed to implementing the Nigerian National Information Technology Policy.

SAS Institute

SAS Institute

SAS is a leader in business analytics software and services providing solutions for a wide range of critical business areas including risk management, compliance and fraud prevention.

ITRecycla

ITRecycla

ITRecycla are specialists in the protection of sensitive computer data by data destruction, re-marketing of reusable computer equipment, computer recycling and disposing of electronic e-waste.

Smart Protection

Smart Protection

Smart Protection are experts in brand and trademark protection - we fight against counterfeits and unauthorized usages of brands with machine learning technology.

DDLS

DDLS

DDLS is Australia's largest provider of corporate IT, process training and cybersecurity training courses and certification programs.

Tyler Technologies

Tyler Technologies

Tyler Technologies is a leading provider of end-to-end information management solutions and services for local governments.

Cyber Defense Networking Solutions (CDNS)

Cyber Defense Networking Solutions (CDNS)

CDNS is a global network infrastructure provider whose platforms are engineered for security, optimized for speed and designed for resiliency.

Zaviant Consulting

Zaviant Consulting

Zaviant Consulting is a leading data security and privacy consulting firm assisting organizations comply with constantly evolving security frameworks and privacy regulations.

Ghost Security

Ghost Security

Ghost is a venture backed, product-led startup building the new standard in application security for the modern enterprise.

Digimune

Digimune

Digimune is an all-encompassing cloud-based cyber risk protection platform that guards you against the dangers of our digital world.

O'Reilly Media

O'Reilly Media

O’Reilly’s help professionals learn best practices and discover emerging trends that will shape the future of the tech industry.

Gcore

Gcore

Gcore is an international leader in public cloud and edge computing, content delivery, hosting, and security solutions.